skip to main content
RFC2898: PKCS #5: Password-Based Cryptography Specification Version 2.02000 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 September 2000
Bibliometrics
Skip Abstract Section
Abstract

This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification.

RFC Downloads

Cited By

  1. ACM
    Sharma T, Nair V, Wang H, Wang Y and Song D “I Can’t Believe It’s Not Custodial!”: Usable Trustless Decentralized Key Management Proceedings of the CHI Conference on Human Factors in Computing Systems, (1-16)
  2. Blanchard E (2022). Client-Side Hashing for Efficient Typo-Tolerant Password Checkers, International Journal of Systems and Software Security and Protection, 13:1, (1-24), Online publication date: 30-Dec-2022.
  3. Kim E, Choi H and Wazan A (2021). Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  4. ACM
    Ferretti L, Marchetti M and Colajanni M (2019). Fog-based Secure Communications for Low-power IoT Devices, ACM Transactions on Internet Technology, 19:2, (1-21), Online publication date: 31-May-2019.
  5. ACM
    Genç Z, Lenzini G and Ryan P Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware Proceedings of the Central European Cybersecurity Conference 2018, (1-6)
  6. ACM
    Marky K, Mayer P, Gerber N and Zimmermann V Assistance in Daily Password Generation Tasks Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, (786-793)
  7. ACM
    Dalskov A and Orlandi C Can You Trust Your Encrypted Cloud? Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (343-355)
  8. Chang B, Cheng Y, Chen B, Zhang F, Zhu W, Li Y and Wang Z (2018). User-friendly deniable storage for mobile devices, Computers and Security, 72:C, (163-174), Online publication date: 1-Jan-2018.
  9. Abdulnabi M, Al-Haiqi A, Kiah M, Zaidan A, Zaidan B and Hussain M (2017). A distributed framework for health information exchange using smartphone technologies, Journal of Biomedical Informatics, 69:C, (230-250), Online publication date: 1-May-2017.
  10. ACM
    Golla M, Beuscher B and Dürmuth M On the Security of Cracking-Resistant Password Vaults Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1230-1241)
  11. ACM
    Schneider J, Fleischhacker N, Schröder D and Backes M Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1192-1203)
  12. Jaeger J, Ristenpart T and Tang Q Honey Encryption Beyond Message Recovery Security Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (758-788)
  13. ACM
    Avoine G, Beaujeant A, Hernandez-Castro J, Demay L and Teuwen P (2016). A Survey of Security and Privacy Issues in ePassport Protocols, ACM Computing Surveys, 48:3, (1-37), Online publication date: 8-Feb-2016.
  14. ACM
    Chang B, Wang Z, Chen B and Zhang F MobiPluto Proceedings of the 31st Annual Computer Security Applications Conference, (381-390)
  15. ACM
    Juels A, Kelley J, Tamassia R and Triandopoulos N Falcon Codes Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1032-1047)
  16. ACM
    Camenisch J, Lehmann A and Neven G Optimal Distributed Password Verification Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (182-194)
  17. Brož M and Matyáš V Selecting a New Key Derivation Function for Disk Encryption Proceedings of the 11th International Workshop on Security and Trust Management - Volume 9331, (185-199)
  18. ACM
    Al-Ameen M, Wright M and Scielzo S Towards Making Random Passwords Memorable Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (2315-2324)
  19. ACM
    Götzfried J and Müller T (2014). Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption, ACM Transactions on Information and System Security, 17:2, (1-23), Online publication date: 17-Nov-2014.
  20. ACM
    Blass E, Mayberry T, Noubir G and Onarlioglu K Toward Robust Hidden Volumes Using Write-Only Oblivious RAM Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (203-214)
  21. Li Z, He W, Akhawe D and Song D The emperor's new password manager Proceedings of the 23rd USENIX conference on Security Symposium, (465-479)
  22. ACM
    Pevný T and Ker A Steganographic key leakage through payload metadata Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, (109-114)
  23. ACM
    Dürmuth M Useful password hashing Proceedings of the 2013 New Security Paradigms Workshop, (31-40)
  24. ACM
    Skillen A, Barrera D and van Oorschot P Deadbolt Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, (3-14)
  25. ACM
    Feiri M, Petit J and Kargl F Efficient and secure storage of private keys for pseudonymous vehicular communication Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles, (9-18)
  26. ACM
    Egele M, Brumley D, Fratantonio Y and Kruegel C An empirical study of cryptographic misuse in android applications Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (73-84)
  27. ACM
    Zhang L and Mislove A Building confederated web-based services with Priv.io Proceedings of the first ACM conference on Online social networks, (189-200)
  28. ACM
    Zhao R and Yue C All your browser-saved passwords could belong to us Proceedings of the third ACM conference on Data and application security and privacy, (333-340)
  29. ACM
    Gejibo S, Mancini F, Mughal K, Valvik R and Klungsøyr J Secure data storage for mobile data collection systems Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (131-144)
  30. Hoffmann J, Uellenbeck S and Holz T SMARTPROXY Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, (184-203)
  31. ACM
    Rennhard M, Tschannen M and Christen T SecureSafe Proceedings of the First Workshop on Measurement, Privacy, and Mobility, (1-6)
  32. Wen C, Dawson E, González Nieto J and Simpson L A framework for security analysis of key derivation functions Proceedings of the 8th international conference on Information Security Practice and Experience, (199-216)
  33. ACM
    Schartner P A low-cost alternative for OAEP Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss, (1-6)
  34. ACM
    Lindqvist J, Aura T, Danezis G, Koponen T, Myllyniemi A, Mäki J and Roe M Privacy-preserving 802.11 access-point discovery Proceedings of the second ACM conference on Wireless network security, (123-130)
  35. ACM
    Malasri K and Wang L Design and implementation of a secure wireless mote-based medical sensor network Proceedings of the 10th international conference on Ubiquitous computing, (172-181)
  36. Boyen X Halting password puzzles Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-16)
  37. ACM
    Malasri K and Wang L Addressing security in medical sensor networks Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, (7-12)
  38. Canetti R, Halevi S and Steiner M Mitigating dictionary attacks on password-protected local storage Proceedings of the 26th annual international conference on Advances in Cryptology, (160-179)
  39. ACM
    Campos R and Ricardo M Dynamic and automatic connection of personal area networks to the global internet Proceedings of the 2006 international conference on Wireless communications and mobile computing, (581-586)
  40. ACM
    Sandhu R, Ranganathan K and Zhang X Secure information sharing enabled by Trusted Computing and PEI models Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (2-12)
  41. ACM
    Kohno T Attacking and repairing the winZip encryption scheme Proceedings of the 11th ACM conference on Computer and communications security, (72-81)
Contributors
  • VeriSign Inc.

Recommendations